merit event - understanding and managing data protection

108
Data Protection Act 1998 Data Protection Act 1998 Introduction to Data Protection Alan Shipman Group 5 Training Limited

Upload: meritnorthwest

Post on 08-May-2015

1.223 views

Category:

Business


1 download

DESCRIPTION

From the 24th of October 2002, the Data Protection Act 1998, which applies to local government, NHS Trusts, Schools, Universities and all UK organisations who process personal information, comes into full force. The Data Protection Act 1998 gives people more rights to have their personal information handled fairly, to object to certain types of processing and to have access to any information held about them. Who should attend: These briefings have been designed for those who are responsible for the implementation of the Data Protection Act 1998. The practical as well as the theory will be dealt with and attendees will have the opportunity to discuss Data Protection business issues with experts and other delegates. Briefing Content: Morning session - Introduction a) The Data Protection Act and its Principles b) Responsibilities c) Policies and Notification d) Dealing with sub-contractors e) Subject Access f) Manual Records g) Human Resource Afternoon Session - Auditing a) Do you need to Audit? b) How to Audit c) Do you know what data you process? d) Reviewing Responsibilities e) Procedures and Processes f) Putting Things Right g) Demonstrating Compliance About the eBusiness Club This training day is being organised as part of the eBusiness Club activities managed on behalf of the Chamber on Merseyside by MERIT (NW) Ltd and supported by leading public and private sector partners. The Merseyside eBusiness club will assist members to achieve the best possible results from their ICT and eBusiness systems. At the same time they will learn about innovations in the market place and hear directly from the leading voices in the industry Full details about the eBusiness Club can be found online at www.merit.org.uk/ebusinessclub or alternatively by contacting Ian Bulmer, eBusiness Club Co-ordinator, MERIT (NW) Ltd, One Old Hall Street, Liverpool. L3 9HG. Tel: 0151 285 1400 email: [email protected]

TRANSCRIPT

Page 1: Merit Event - Understanding and Managing Data Protection

Data Protection Act 1998Data Protection Act 1998

Introduction to

Data Protection

Alan Shipman

Group 5 Training Limited

Page 2: Merit Event - Understanding and Managing Data Protection

BSI TrainingBSI Training

Objective for Session

To help you understand the

Data Protection Act 1998, and be able to assess your organisations level of

compliance

Page 3: Merit Event - Understanding and Managing Data Protection

BSI Training WorkshopBSI Training WorkshopAgenda

• Definitions

• Data Protection Principles

• Responsibilities

• Policies and Notification

• Dealing with Data Processors

• Subject Access Procedures

• Manual Records

• Human Resource

Page 4: Merit Event - Understanding and Managing Data Protection

BSI Training WorkshopBSI Training WorkshopAgenda

• Do you need to audit

• How to audit

• Data audit

• Responsibilities

• Procedures and processes

• How an audit is carried out

• Corrective Procedures

• Demonstrating compliance

Page 5: Merit Event - Understanding and Managing Data Protection

IntroductionsIntroductions

Page 6: Merit Event - Understanding and Managing Data Protection

DefinitionsDefinitions

Page 7: Merit Event - Understanding and Managing Data Protection

The ActThe Act

Data Protection Act 1998

‘An Act to make provision for the regulation of the processing of

information relating to individuals …’

Page 8: Merit Event - Understanding and Managing Data Protection

The ActThe Act

EU Data Protection Directive 95/46/EC

Objectives …

• No restriction on personal data flow in EU

• Right to privacy

Deadline for implementation

• 24 October 1998

Page 9: Merit Event - Understanding and Managing Data Protection

DefinitionsDefinitions

Personal Data

Data which relates to a living individual who can be identified from those data, or from those data and other information which is in, or likely to come into, the possession of the data controller

Page 10: Merit Event - Understanding and Managing Data Protection

DefinitionsDefinitions

Processing

• Includes obtaining, holding and carrying out any operation on data

• No requirement that processing is by reference to data subject

Page 11: Merit Event - Understanding and Managing Data Protection

The Eight PrinciplesThe Eight Principles

Page 12: Merit Event - Understanding and Managing Data Protection

PrinciplesPrinciples

The 8 Data Protection Principles

(Schedule 1)

Page 13: Merit Event - Understanding and Managing Data Protection

First PrincipleFirst Principle

Personal data shall be processed fairly and lawfully, and in particular, shall not be processed unless:-

a) at least 1 of the conditions in Schedule 2 is met,

and

b) in the case of sensitive personal data, at least 1

of the conditions in Schedule 3 is also met

Page 14: Merit Event - Understanding and Managing Data Protection

Schedule 2Schedule 2

What is fair?• Consent

• Contract

• Legal obligation

• Vital interests

• Public functions

• Legitimate interests

Page 15: Merit Event - Understanding and Managing Data Protection

Sensitive DataSensitive Data

Personal data relating to:• Racial or ethnic origin

• Political beliefs

• Religious or other beliefs

• Trade union membership

• Physical or mental health

• Sexual life

• Commission of any offence

• Proceedings / convictions for any offence

Page 16: Merit Event - Understanding and Managing Data Protection

Schedule 3Schedule 3

What is fair?• Explicit consent

• Employment law

• Vital interests

• Activities of political, religious or trade unions

• Information made public

• Legal / regulatory proceedings

• Administration of justice

• Medical purposes

Page 17: Merit Event - Understanding and Managing Data Protection

Second PrincipleSecond Principle

Personal data shall be obtained only for one or more specified purposes, and shall not be further processed in any manner incompatible with that purpose or purposes

Page 18: Merit Event - Understanding and Managing Data Protection

Third PrincipleThird Principle

Personal data shall be adequate, relevant and not excessive in relation to the purpose for which it is processed

Page 19: Merit Event - Understanding and Managing Data Protection

Fourth PrincipleFourth Principle

Personal data shall be accurate and where necessary, kept up to date

Page 20: Merit Event - Understanding and Managing Data Protection

Fifth PrincipleFifth Principle

Personal data processed for any purpose shall not be kept for longer than is necessary for that purpose

Page 21: Merit Event - Understanding and Managing Data Protection

Sixth PrincipleSixth Principle

Personal data shall be processed in accordance with the rights of data subjects under this Act

Page 22: Merit Event - Understanding and Managing Data Protection

Seventh PrincipleSeventh Principle

Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data

Page 23: Merit Event - Understanding and Managing Data Protection

Eighth PrincipleEighth Principle

Personal data shall not be transferred to a country or territory outside the EEA unless that country or territory ensures an adequate level of Data Protection

Note: Does not apply if at least 1 of the conditions in Schedule 4 is met

Page 24: Merit Event - Understanding and Managing Data Protection

Schedule 4Schedule 4

When can you do it?• Consent

• Performance of contract with data subject

• Performance of contract with other

• Substantial public interest

• Legal proceedings

• Vital interests

• Public register

• Authorised by the Commissioner

Page 25: Merit Event - Understanding and Managing Data Protection

ResponsibilitiesResponsibilities

Page 26: Merit Event - Understanding and Managing Data Protection

ResponsibilitiesResponsibilities

The ‘Data Controller’ is the organization, but……..

• Someone must have overall responsibility– co-ordination role

– ensure that notification is up to date

– ensure that appropriate strategy is implemented

– focal point for queries

– reporting of issues

Page 27: Merit Event - Understanding and Managing Data Protection

ResponsibilitiesResponsibilities

Policy

• Who writes it

• Who approves it

Approval by top management (e.g. the Board) demonstrates support and buy-in

Page 28: Merit Event - Understanding and Managing Data Protection

ResponsibilitiesResponsibilities

Compliance audit

• Is the policy being implemented

• Are individuals following the procedures

• Audit report

• Resolve non-compliances

• Annual report (maybe)

Page 29: Merit Event - Understanding and Managing Data Protection

ResponsibilitiesResponsibilities

Who!

• Who is actually responsible

• Who will be the first to get it wrong?

Any member of staff who handles personal data

Page 30: Merit Event - Understanding and Managing Data Protection

ResponsibilitiesResponsibilities

Training

• Do individuals know what they must do– when talking to data subjects

– when handling personal data

– during system design

– when deciding security issues

• Ensure no-one acts recklessly

Page 31: Merit Event - Understanding and Managing Data Protection

ResponsibilitiesResponsibilities

Training

• Give everyone guidelines

• Do they understand their responsibilities

• And what happens if they get it wrong

Page 32: Merit Event - Understanding and Managing Data Protection

ResponsibilitiesResponsibilities

Subject access

• Who deals with subject access requests

• How are they dealt with– procedures

– time scales

– fees

Page 33: Merit Event - Understanding and Managing Data Protection

NotificationNotification

Page 34: Merit Event - Understanding and Managing Data Protection

NotificationNotification

What you have to do• Review current registration(s)

• Determine timescales

• Categorise your data– Use the Notification Handbook

• Check security arrangements

Page 35: Merit Event - Understanding and Managing Data Protection

NotificationNotification

Notification• Check for exemptions– from notification

– from the Act

• Decide method– phone

– web

Page 36: Merit Event - Understanding and Managing Data Protection

NotificationNotification

Current registration(s)• Get details of all registrations

• Find out when each one expires

• As current registrations run out - combine

• When last registration run out - notify

• Or just notify ASAP

Page 37: Merit Event - Understanding and Managing Data Protection

NotificationNotification

Categorise Personal Data• Get relevant OIC notification template

• Compare with information audit results

• Categorise data– why have you got it (purpose) - Handbook 3.1.8

– who is it about (data subject) - Handbook 3.1.9

– what have you got (data class) - Handbook 3.1.10

– who might it be disclosed to (recipients) - Handbook 3.1.11

Page 38: Merit Event - Understanding and Managing Data Protection

NotificationNotification

Check security arrangements

• Comply with BS 7799?

• Security policy / procedures

• Disaster recovery plans

• Security during transfer– physical

– encryption

Page 39: Merit Event - Understanding and Managing Data Protection

NotificationNotification

Notification• What information do you need– identity

– purposes

– for each purpose• data subject

• data class

• recipients

– what countries are involved

– security measures

Page 40: Merit Event - Understanding and Managing Data Protection

NotificationNotification

How?• Method– phone

– web

• What happens next– check form

– pay fees

– check register

• Keep it up to date (28 days)

Page 41: Merit Event - Understanding and Managing Data Protection

NotificationNotification

Phone Notification• Be ready

• Contact by phone

• Answer questions

Page 42: Merit Event - Understanding and Managing Data Protection

NotificationNotification

Web Notification• Where to go

• What do you see

• How does it work

Page 43: Merit Event - Understanding and Managing Data Protection

Data ProcessorsData Processors

Page 44: Merit Event - Understanding and Managing Data Protection

Data ProcessorsData Processors

Definition

Process personal data on behalf of a Data Controller, and does not implement its own

purposes

Page 45: Merit Event - Understanding and Managing Data Protection

Data ProcessorsData Processors

Responsibilities

Who is responsible for data processed by a Data Processor?

The Data Controller - i.e. you!

Page 46: Merit Event - Understanding and Managing Data Protection

Subject Access ProceduresSubject Access Procedures

Page 47: Merit Event - Understanding and Managing Data Protection

Subject AccessSubject Access

Whole purpose of Data Protection law is to protect information about living

individuals and guard their privacy

Page 48: Merit Event - Understanding and Managing Data Protection

Subject AccessSubject Access

Procedures• Who will deal with requests

• How will request be verified– identity

– in writing

– fees

• What has been requested (reasonable?)

• Keep an audit trail of requests

Page 49: Merit Event - Understanding and Managing Data Protection

Subject AccessSubject Access

Procedures• How to respond– is processing occurring

– don’t correct it!

– copy of the data

– source (if known)

– not disclosed due to exemption

– disproportionate effort

– what if a third party is identified

• When to respond by (40 days)

Page 50: Merit Event - Understanding and Managing Data Protection

Subject AccessSubject Access

Procedures• How to handle blocking requests– made by data subject

– validity

– ensure action

– audit trails

• Compensation

Page 51: Merit Event - Understanding and Managing Data Protection

Subject AccessSubject Access

Procedures• Automatic processing–manual decision override

Page 52: Merit Event - Understanding and Managing Data Protection

Manual RecordsManual Records

Page 53: Merit Event - Understanding and Managing Data Protection

Manual RecordsManual Records

Types• Now included:– paper

– microfilm

– CCTV

– voice recording

• Be prepared!

Page 54: Merit Event - Understanding and Managing Data Protection

Human ResourcesHuman Resources

Page 55: Merit Event - Understanding and Managing Data Protection

Human ResourcesHuman Resources

Issues• Personnel files

• Managers own copies

• e-mails

• References

Page 56: Merit Event - Understanding and Managing Data Protection

Do you need to audit?Do you need to audit?

Page 57: Merit Event - Understanding and Managing Data Protection

Need to audit?Need to audit?

Do you know:

• Where you store personal data?

• Who has access to it?

• How do they use it?

• Are the security measures adequate?

If NO to any, you need to audit!

Page 58: Merit Event - Understanding and Managing Data Protection

What an audit should achieveWhat an audit should achieve

Page 59: Merit Event - Understanding and Managing Data Protection

Audit objectivesAudit objectives

What should be achieved?

• Demonstration of compliance

• Improved confidence

• Better procedures

Page 60: Merit Event - Understanding and Managing Data Protection

Audit objectivesAudit objectives

Who is being audited?

• Your own organization– whole

– part

• A third party– data processor

Page 61: Merit Event - Understanding and Managing Data Protection

Audit objectivesAudit objectives

Who undertakes DP audits?

• Internal auditor

• External auditor

• Information Commissioner

• Customers

Page 62: Merit Event - Understanding and Managing Data Protection

Data auditData audit

Page 63: Merit Event - Understanding and Managing Data Protection

Data auditData audit

Who knows what is processed?

• Department managers

• Records managers

• IT staff

• Users

Page 64: Merit Event - Understanding and Managing Data Protection

Data auditData audit

How to audit

• Don’t ask open questions–What data have you got?

• Create a survey form

• Use the ‘headers’ from the Notification Handbook

Page 65: Merit Event - Understanding and Managing Data Protection

Review responsibilitiesReview responsibilities

Page 66: Merit Event - Understanding and Managing Data Protection

ResponsibilitiesResponsibilities

Are these responsibilities defined?• Who has specific responsibility

• Who approves policy

• Who audits compliance

• Who trains staff

• Who deals with subject access requests

• Who deals with security issues

Page 67: Merit Event - Understanding and Managing Data Protection

Procedures and processesProcedures and processes

Page 68: Merit Event - Understanding and Managing Data Protection

Processes & proceduresProcesses & procedures

Data Protection Policy

• Is there one?

• Has it been approved?

• Is it available to all?

• Are responsibilities included?

• Is the policy policed?

Page 69: Merit Event - Understanding and Managing Data Protection

Processes & proceduresProcesses & procedures

Data Protection Co-ordinator

• Is there one?

• Conversant with the Act?

• Known to all staff?

• Able to liaise with other departments?

Page 70: Merit Event - Understanding and Managing Data Protection

Data UseData Use

Fair processing

• When collecting data, is it performed fairly?–Do users know what they can do (and cannot

do)

Page 71: Merit Event - Understanding and Managing Data Protection

Data UseData Use

Disclosure of data

• Do staff know when to disclose?

• Does the policy include guidelines and training requirements?

Page 72: Merit Event - Understanding and Managing Data Protection

PeoplePeople

Management of people

• Are there appropriate management strategies for all staff?

• Does this include:– recruitment?

– training / direction?

– supervision / discipline?

Page 73: Merit Event - Understanding and Managing Data Protection

PeoplePeople

Management of people

• Is there an effective communications system?

• Is DP compliance in contract of employment?

• Is there a disciplinary procedure?

Page 74: Merit Event - Understanding and Managing Data Protection

DocumentationDocumentation

Management of documentation

• Are there adequate audit trails?

• Are there documented procedures:– collection, access, use?

– disclosure?

– transfer?

– disposal?

Page 75: Merit Event - Understanding and Managing Data Protection

DocumentationDocumentation

Management of documentation

• Are there procedures for:– data subject explanations?

– recording of subject access requests?

– how to use data correctly?

– staff obligations / authority?

Page 76: Merit Event - Understanding and Managing Data Protection

Data qualityData quality

Data audit

• Are there procedures for ensuring that data is:– adequate, relevant and not excessive?

– accurate?

– retention and destruction?

– security?

Page 77: Merit Event - Understanding and Managing Data Protection

Data qualityData quality

Data audit

• Do you review data quality?– effective training and communications?

– authority?

– procedures?

– review new systems?

Page 78: Merit Event - Understanding and Managing Data Protection

Data qualityData quality

Data audit

• Have you reviewed your processing?– information needs?

– storage formats?

– purposes?

– fair collection?

– fair use?

Page 79: Merit Event - Understanding and Managing Data Protection

Data qualityData quality

Data audit

• Have you reviewed your processing?– deleted unwanted data?

– information need policy?

– review procedures?

– review responsibilities?

– results documented?

Page 80: Merit Event - Understanding and Managing Data Protection

Data qualityData quality

Data audit

• Have you reviewed your processing?– results reviewed?

– identify ‘sensitive’ data?

– actions implemented?

– review complete?

– established need?

Page 81: Merit Event - Understanding and Managing Data Protection

Data qualityData quality

Data acquisition

• Is data collection:– restricted to a minimum?

– justified?

Page 82: Merit Event - Understanding and Managing Data Protection

Data qualityData quality

Data acquisition

• Do data collection procedures:– identify data need?

– identify minimum requirement?

– justify each item?

– check for alternative source?

– act in the best interests of subject

– authorise collection?

Page 83: Merit Event - Understanding and Managing Data Protection

Data qualityData quality

Data acquisition

• Are data collection forms appropriate?– paper?

–web?

– verbal?

• Does they include consent requirements?

Page 84: Merit Event - Understanding and Managing Data Protection

Data qualityData quality

Data accuracy

• Do you avoid recording of opinions?

• Where inaccurate data is held:– is it retained where it is a true record?

– are reasonable steps taken?

– is the data subject notified if necessary?

Page 85: Merit Event - Understanding and Managing Data Protection

Data qualityData quality

Data retention

• Are retention periods justifiable?

• Are retention periods sufficient?

• Has legal advice been taken?

• Have you checked for relevant Codes of Practice?

Page 86: Merit Event - Understanding and Managing Data Protection

Data qualityData quality

Data retention

• Are records up to date?

• Is accuracy checked?

• Is frequency of checking adequate?

• Is inaccurate data deleted where necessary?

Page 87: Merit Event - Understanding and Managing Data Protection

Data qualityData quality

Data destruction

• Is there a retention and destruction policy?

• Are these supported by procedures?

• Is compliance monitoring included?

• Is the retention schedule appropriate?

Page 88: Merit Event - Understanding and Managing Data Protection

Data qualityData quality

Data destruction

• Are there destruction procedures?

• Is inadvertent destruction prevented?

• Are destruction procedures audited?

Page 89: Merit Event - Understanding and Managing Data Protection

SecuritySecurity

Security procedures

• Is security on the DP agenda?– technical?

– procedural?

• Supervision and training included?

Page 90: Merit Event - Understanding and Managing Data Protection

SecuritySecurity

Security measures

• Is there an information security policy, including DP?

• Monitored and reviewed?

• Responsibilities?

• Staff procedures?

Page 91: Merit Event - Understanding and Managing Data Protection

SecuritySecurity

Security measures

• Suitable technology used?

• Security levels appropriate?

• Security in Data Processor contracts?

• BS ISO 17799?

Page 92: Merit Event - Understanding and Managing Data Protection

SecuritySecurity

Security threats

• Have these been identified?

• Contingency plans appropriate?

• Recovery times acceptable?

Page 93: Merit Event - Understanding and Managing Data Protection

SecuritySecurity

Security procedures

• Security of data transfers?

• Security of destruction?

Page 94: Merit Event - Understanding and Managing Data Protection

Subject Access RequestSubject Access Request

Procedures

• Is there a documented procedure?

• Does it check for request validity?

• Do you:– confirm you are processing?

– provide copy of the data?

Page 95: Merit Event - Understanding and Managing Data Protection

Subject Access RequestSubject Access Request

Procedures

• Is there a manual override for automated processing?

• Are amendments stopped when a request is being processed?

• Is there a fee charging policy?

Page 96: Merit Event - Understanding and Managing Data Protection

Subject Access RequestSubject Access Request

Procedures

• Is the request processed in time?

• Is there an identification procedure?

• Is the person who deals with requests known?

• Do searches include data processors?

Page 97: Merit Event - Understanding and Managing Data Protection

Subject Access RequestSubject Access Request

Procedures

• Is data supplied in permanent form?

• Is there a procedure where disproportionate effort is claimed?

• Is the data source disclosed?

• Is there a telephone request procedure?

Page 98: Merit Event - Understanding and Managing Data Protection

Subject Access RequestSubject Access Request

Procedures

• Is there a request form?

• Is there a procedure for requests by minors?

• Is there a procedure for requests on behalf of minors?

Page 99: Merit Event - Understanding and Managing Data Protection

Subject Access RequestSubject Access Request

Procedures

• Is there a procedure for requests for references?– are the rights of third parties considered?

• Is there a procedure where objections to processing are received?

Page 100: Merit Event - Understanding and Managing Data Protection

How to carry out an auditHow to carry out an audit

Page 101: Merit Event - Understanding and Managing Data Protection

Audit processAudit process

How to audit?• Project plan

• Identify:– who should be interviewed

– which processes to review

– how to audit security measures

• Creating awareness

• Use the Workbook!

Page 102: Merit Event - Understanding and Managing Data Protection

Audit processAudit process

BSI-DISC Pre-Audit Workbook

PD 0012-5

• Assists and documents audit

• Provides statement of compliance

• Links to procedural documentation

Page 103: Merit Event - Understanding and Managing Data Protection

Audit processAudit process

Document results

• Necessary to demonstrate process and results

• Provides an audit trail of compliance

• Workbook is a great help!

Page 104: Merit Event - Understanding and Managing Data Protection

Corrective Actions

Page 105: Merit Event - Understanding and Managing Data Protection

Corrective ActionsCorrective Actions

What to do• Are there any gaps?

• Each gap should be reviewed and corrective action taken

• Look at subject access procedures first

• Use common sense!

• Pretend that it is your data!

Page 106: Merit Event - Understanding and Managing Data Protection

Demonstrating Compliance

Page 107: Merit Event - Understanding and Managing Data Protection

Data ProtectionData Protection

Demonstrating Compliance

• Completed Workbook

• Training records

• Policies

• Records of breaches and actions

• Records of subject access requests

Page 108: Merit Event - Understanding and Managing Data Protection

Thank youThank you

Any Questions?Any Questions?

Alan ShipmanAlan Shipman07702-12526507702-125265

[email protected]@group5.co.uk